OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP. Port: A port is an address on a single machine that can be tied to a specific piece of software
This tutorial helps you to learn about Computer Network.
Key Concepts:
ISO OSI reference model, Service Architecture, Reference Architecture, 7 Layers of OSI, OSI Layers Protocol Stack, physical Layer, Data Link Layer, Network Layer, Transpost Layer, Session Layer, Presentation Layer, Application Layer
For more detail visit our Tech Blog:
https://msatechnosoft.in/blog/tech-blogs/
This tutorial help you to learn about Computer Network.
Key Concepts:
Protocol Layers,
Advantages of Layering.
Protocols,
Open System Protocols,
Network Protocols,
Internet Protocol Stack,
Postal Network,
Protocol Layering & Data
For more detail visit Tech Blog:
https://msatechnosoft.in/blog/
This slide is all about OSI model of Computer Network. It was the very first standard model for Computer Network System. In this slide I have discussed about the 7 layers of OSI model.
This tutorial helps you to learn about Computer Network.
Key Concepts:
TCP/IP,
High Level Protocols,
MIME Types,
Network Firewall,
Network Addresses,
Domain Name Server (DNS)
For more detail visit our Tech Blog:
https://msatechnosoft.in/blog/
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
A document about TCP/IP and OSI would typically cover two major networking models: the TCP/IP model and the OSI model. These models are both conceptual frameworks that describe the layers of communication protocols that are necessary for data to be transmitted over a network.
The TCP/IP model is a four-layer model that is used by the Internet. It includes the Application layer, Transport layer, Internet layer, and Network Access layer. Each layer has a specific function, such as providing application-level services, ensuring reliable data transmission, routing packets over the Internet, and controlling the physical transmission of data over the network.
The OSI model, on the other hand, is a seven-layer model that was developed by the International Organization for Standardization (ISO). It includes the Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data Link layer, and Physical layer. Each layer in this model also has a specific function, such as formatting data for presentation, managing communication sessions between network nodes, and managing physical connections between network devices.
In a document about TCP/IP and OSI, you might find information on the similarities and differences between the two models, the advantages and disadvantages of each model, and examples of how each model is used in real-world networking scenarios. You might also find information on specific protocols that are used within each model, such as TCP, UDP, IP, and Ethernet, and how these protocols work together to facilitate communication between network devices.
Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP. Port: A port is an address on a single machine that can be tied to a specific piece of software
This tutorial helps you to learn about Computer Network.
Key Concepts:
ISO OSI reference model, Service Architecture, Reference Architecture, 7 Layers of OSI, OSI Layers Protocol Stack, physical Layer, Data Link Layer, Network Layer, Transpost Layer, Session Layer, Presentation Layer, Application Layer
For more detail visit our Tech Blog:
https://msatechnosoft.in/blog/tech-blogs/
This tutorial help you to learn about Computer Network.
Key Concepts:
Protocol Layers,
Advantages of Layering.
Protocols,
Open System Protocols,
Network Protocols,
Internet Protocol Stack,
Postal Network,
Protocol Layering & Data
For more detail visit Tech Blog:
https://msatechnosoft.in/blog/
This slide is all about OSI model of Computer Network. It was the very first standard model for Computer Network System. In this slide I have discussed about the 7 layers of OSI model.
This tutorial helps you to learn about Computer Network.
Key Concepts:
TCP/IP,
High Level Protocols,
MIME Types,
Network Firewall,
Network Addresses,
Domain Name Server (DNS)
For more detail visit our Tech Blog:
https://msatechnosoft.in/blog/
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
A document about TCP/IP and OSI would typically cover two major networking models: the TCP/IP model and the OSI model. These models are both conceptual frameworks that describe the layers of communication protocols that are necessary for data to be transmitted over a network.
The TCP/IP model is a four-layer model that is used by the Internet. It includes the Application layer, Transport layer, Internet layer, and Network Access layer. Each layer has a specific function, such as providing application-level services, ensuring reliable data transmission, routing packets over the Internet, and controlling the physical transmission of data over the network.
The OSI model, on the other hand, is a seven-layer model that was developed by the International Organization for Standardization (ISO). It includes the Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data Link layer, and Physical layer. Each layer in this model also has a specific function, such as formatting data for presentation, managing communication sessions between network nodes, and managing physical connections between network devices.
In a document about TCP/IP and OSI, you might find information on the similarities and differences between the two models, the advantages and disadvantages of each model, and examples of how each model is used in real-world networking scenarios. You might also find information on specific protocols that are used within each model, such as TCP, UDP, IP, and Ethernet, and how these protocols work together to facilitate communication between network devices.
This is a notes about basic introduction of OSI Model & TCP/IP Model. It contain details about the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
These notes are for Internet Protocol and the OSI model layers
So any student looking for notes for the internet protocol layers , this is among the best
Points Covered
UNIT 1:
1. The Internet Architecture
2. Networking Devices
3. OSI Model
4. TCP/IP Model
5. Topologies
6. Types of Networks with diagrams.
7.
UNIT 2:
1. X.25
2. Frame Relay
3. FDDI
4. Token Ring
5. Bluetooth
6. RFID
7. Asynchronous Transfer Mode (ATM)
UNIT 3:
1. Data Link Layer
2. Error Control
3. Flow Control
4. Types of services provided to the network layer
UNIT 4:
1. Classful IP Addressing
2. Difference between IPV4 and IPV6
3. Piggybacking
4. Methods to improve QoS
5. Subnet, subnet mask, Private IP, Public IP and NAT
6. Congestion Control and how it works in TCP
7. TCP and UDP
8. Explain TCP with its header format
9. Socket
UNIT 5:
1. Application Layer
2. DNS
3. SMTP
4. POP3
5. HTTP
6. URL
7. FTP
8. Basic functions of e-mail system
9. HTTP,FTP Difference
UNIT 6:
1. Network Security Goals
2. Public key Encryption/Decryption
3. Public and Private key Encryption
4. What is a firewall? Mention the types of firewalls
5. Steps followed in creating digital signature
6. Differentiate between digital signature and digital certificate
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. Introduction to OSI Model
• OSI model is based on the proposal developed by the International
Standards Organization (ISO).
• This model is called ISO OSI (Open Systems Interconnection) Reference
model because it deals with connecting open systems (systems that are
open for communication with other systems)
3. Principles on which OSI model was designed:
• Each layer should perform a well defined function.
• The function of each layer should be chosen according to the internationally standardized
protocols.
• The number of layers should be large enough that distinct functions should not be put in
the same layer and small enough that the architecture does not become very complex.
8. Physical Layer
• It is the bottom layer of OSI Model.
• It is responsible for the actual physical connection between the devices. Such physical
connection may be made by using twisted pair cable.
• It is concerned with transmitting bits over a communication channel.
Functions of Physical Layer
• Transforming bits into signals
• Provides synchronization of bits by a clock.
• Physical layer manages the way a device connects to network media.
• It defines the transmission rate.
• It defines the way in which the devices are connected to the medium.
• It provides physical topologies
It can use different techniques of multiplexing
10. Functions of Data Link Layer
• Framing : DLL divides the bits received from N/W layer into frames. (Frame contains
all the addressing information necessary to travel from S to D).
• Physical addressing: After creating frames, DLL adds physical address of
11. sender/receiver (MAC address) in the header of each frame.
• Flow Control: DLL prevents the fast sender from drowning the slow receiver.
• Error Control: It provides the mechanism of error control in which it detects &
retransmits damaged or lost frames.
• Access Control: When single comm. Channel is shared by multiple devices, MAC layer
of DLL provides help to determine which device has control over the channel.
12. Data Link Layer (Contd.)
o It is responsible for node-to-node delivery of data.
o It receives the data from network layer and creates FRAMES , add
physical address to these frames & pas them to physical layer
o It consist of 2 layers:
o Logical Link Layer (LLC) : Defines the methods and
provides addressing information for communication
between network devices.
o Medium Access Control (MAC): establishes
and maintains links between communicating
devices.
15. Network Layer (Contd.)
• It is responsible for the source to destination delivery of a packet across multiple
networks.
• If two systems are attached to different networks with devices like routers, then
N/W layer is used.
• Thus DLL overseas the delivery of the packet between the two systems on same
network and the network layer ensures that the packet gets its point of origin to
its final destination.
Functions of Network Layer:
• Internetworking: It provides Internetworking.
• Logical Addressing: When packet is sent outside the network, N/W layer adds Logical
(network) address of the sender & receiver to each packet.
• Network addresses are assigned to local devices by n/w administrator and assigned
dynamically by special server called DHCP (Dynamic Host Configuration Protocol).
• Routing: When independent n/w are connected to create internetwork several routes
are available to send the data from S to D. These n/w are interconnected by routers &
gateways that route the packet to final destination.
17. Transport Layer (Contd.)
• It is responsible for process-to-process delivery of the entire message.
• TL looks after the delivery of entire message considering all its packets & make
sure that all packets are in order. On the other hand n/w layer treated each
packet independently.
• At the receiver side, TL provides services to application layer & takes services
form n/w layer.
• At the source side, TL receives message from upper layer into packets and
reassembles these packets again into message at the destination.
18. Transport Layer (Contd.)
Transport Layer provides two types of services:
• Connection Oriented Transmission: In this type of transmission the receiving devices
sends an acknowledge back to the source after a packet or group of packet is
received. It is slower transmission method.
• Connectionless Transmission: In this type of transmission the receiving devices does
not sends an acknowledge back to the source. It is faster transmission method.
19. Functions of Transport Layer:
• Segmentation of message into packet & reassembly of packets into
message.
• Port addressing: Computers run several processes. TL header include a
port address with each process.
• Flow Control: Flow control facility prevents the source form sending data
packets faster than the destination can handle.
• Error control: TL ensures that the entire message arrives at the receiving
TL without error.
21. Session Layer
• Session layer is the fifth layer of OSI Model
• It has the responsibility of beginning, maintaining and ending the communication
between two devices, called session.
• It also provides for orderly communication between devices by regulating the flow of
data.
Functions of Session Layer
• Establishing, Maintaining and ending a session: When sending device first contact with
receiving device, it sends syn (synchronization) packet to establish a connection &
determines the order in which information will be sent. Receiver sends ack
(acknowledgement). So the session can be set & end.
• Dialog Control: This function determines that which device will communicate first and the
amount of data that will be sent.
• Dialog separation: Process of adding checkpoints & markers to the stream of data is called
dialog separation.
23. Presentation Layer (Contd.)
• Presentation layer is the sixth layer of OSI Model.
• It is concerned with the syntax & semantics of the information exchanged between the
two devices.
24. • It was designed for data encryption, decryption and compression.
Functions of Presentation Layer
• Data Presentation or Translation: Because different computers use different
encoding systems. It ensures that the data being sent is in the format that the
recipient can process.
• Data Encryption: PL provides this facility by which hides the information from
everyone except the person who originally sent the information & the intended
recipient. When encrypted data arrives at destination, PL decrypts the message.
• Data Compression: PL shrinks large amount of data into smaller pieces i.e. it
reduces the size of data.
Application Layer
25. Application Layer (Contd.)
• It is the topmost i.e. seventh layer of OSI Model.
• It enables the user to access the network.
• It provides user interface & supports for services such as e-mail, file transfer, access to
the world wide web.
26. • So it provides services to different user applications.
Functions of Application Layer:
• Mail Services: This application provides various e- mail services.
• File transfer & Access: It allows users to access files in a remote host, to retrieve files
from remote computer for use etc.
• Remote log-in: A user can log into a remote computer and access the resources of
that computer.
• Accessing the World Wide Web: Most common application today is the access of the
World Wide Web.